Computer Network LAB
Networking refers to the practice of connecting computers and other devices to share resources, exchange data, and communicate. It forms the backbone of modern communication and the internet, enabling everything from email and social media to cloud computing.Objectives of a Computer Network LabEducational: Provide hands-on experience with networking hardware and software.Research: Enable experimentation and development of new networking protocols and technologies.Testing: Allow for the simulation and analysis of network performance and security.Development: Support the creation and troubleshooting of network-based applications.
Wireless Sensor Network Security
Wireless Sensor Networks (WSNs) have expanded rapidly due to advances in communication technologies, offering diverse applications that benefit society. WSNs rely on interconnected sensor nodes and demand secure data transmission and resource access to ensure Quality of Service (QoS) in IoT systems. However, current systems often rely on single-layer security or classical cryptography, which are prone to attacks and lead to energy inefficiency from key management tasks. Biometric or fuzzy logic-based methods also fall short in optimizing security. A lightweight, secure, and durable paradigm for WSNs is crucial. We propose a high-efficiency routing system using Systematic-Random Linear Network Coding (S-RLNC), integrating multi-generation mixing, advanced pre-coding, and interleaving for secure, QoS- aware communication. Simulations show improved packet delivery, reduced redundancy, energy efficiency, and minimal packet loss. Additionally, a novel multi-factor authentication approach combining biometrics, time stamping, and RSA-assisted ECC enhances security and QoS with lower latency and higher delivery rates.
Self-Healing Networks and Resilient Architectures
This book explores the emerging paradigm of self-healing networks-digital infrastructures that can automatically detect, diagnose, and repair faults without human intervention. With growing reliance on uninterrupted connectivity across sectors like healthcare, smart cities, military, and autonomous systems, network resilience has become critical. The book explains key concepts such as fault tolerance, robustness, survivability, and adaptability, and shows how these are achieved through technologies like AI/ML, SDN, NFV, edge computing, blockchain, and digital twins. It outlines practical design principles for building networks that remain operational even in failure conditions, offering both theoretical foundations and real-world case studies. Written in an engaging, accessible style, the book serves as a guide for engineers, researchers, and decision-makers aiming to build intelligent, fault-tolerant, and highly available network systems.
The Language of Machines
This book offers a clear, accessible guide to the inner workings and real-world impact of large language models (LLMs). As AI becomes increasingly integrated into daily life, understanding how LLMs generate human-like text is crucial for professionals across technology, education, policy, and more. The book covers core concepts in NLP and machine learning, while addressing ethical concerns like algorithmic bias, privacy, and automation's effects on employment. Through real-world case studies from organizations like OpenAI and DeepMind, it explores both the promise and risks of AI-powered communication tools. By connecting technological advancements with ethical and societal questions, The Language of Machines equips readers to engage thoughtfully with AI and its evolving role in shaping our world.
IoT Security using VHDL
Designing robust IoT security solutions using VHDL offers a pathway to hardware-level protection against various threats. VHDL allows developers to implement cryptographic algorithms like AES or RSA directly into the hardware, providing significantly faster and more energy-efficient encryption compared to software implementations. Furthermore, VHDL can be used to create secure boot mechanisms that verify the integrity of firmware during startup, preventing unauthorized code execution. Implementing access control mechanisms and authentication protocols in hardware using VHDL also strengthens security by reducing the attack surface vulnerable to software exploits. By leveraging the capabilities of VHDL, developers can create tamper-resistant and highly secure IoT devices that are difficult for malicious actors to compromise, ultimately fostering trust and reliability within connected ecosystems.
Energy and Throughput Optimization in NB-IoT Networks
This study aims to enhance energy efficiency and network throughput in Narrowband IoT (NB-IoT) and Narrowband Cognitive Radio IoT (NB-CR-IoT) networks. A novel three-hop communication strategy is proposed, employing a double auction mechanism to optimize relay selection and extend the battery life of cell-edge NB-IoT users (CENUs). The approach is supported by the EENU-MWM algorithm, which ensures efficient and fair user matching. With the rapid proliferation of IoT devices, critical challenges such as spectrum congestion and hardware limitations for continuous sensing have emerged. To address these issues, the study introduces optimized sensing parameters and relay node selection strategies within NB-CR-IoT and Narrowband Cognitive Radio Internet of Medical Things (NB-CR-IoMT) frameworks. These enhancements improve overall data throughput while reducing transmission power consumption.
Computational Science and Its Applications - Iccsa 2025
The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th International Conference on Computational Science and Its Applications - ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 71 full papers, 6 short papers, and 1 PHD showcase paper were carefully reviewed and selected from 269 submissions. The papers have been organized in topical sections as follows: Part I: Computational Methods, Algorithms and Scientific Applications; High Performance Computing and Networks; Geometric Modeling, Graphics and Visualization; Advanced and Emerging Applications; Information Systems and Technologies; Urban and Regional Planning. Part II: Information Systems and Technologies; Part III: Information Systems and Technologies; Urban and Regional Planning; PHD Showcase Paper; Short papers.
Navigating the Digital Maze
Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections between social media, mental health, and safety. It goes on to explore the impact social media has had on mental health since the rise of YouTube, Instagram, TikTok, and Snapchat, providing tips for healthy social media consumption with a focus on authenticity, equanimity, and moderation. The book addresses some of today's most pressing topics-cyberbullying, trolling, body-shaming-and provides proven prevention and coping strategies for teens. It also highlights the contribution parents, educators, and therapists must make for the maintenance of a safe digital world, along with chapters on self-care methods such as journaling and mindfulness. Navigating the Digital Maze gives readers the knowledge needed to navigate their online presence and form helpful online communities to lead a more healthy, balanced digital life.
Navigating the Digital Maze
Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections between social media, mental health, and safety. It goes on to explore the impact social media has had on mental health since the rise of YouTube, Instagram, TikTok, and Snapchat, providing tips for healthy social media consumption with a focus on authenticity, equanimity, and moderation. The book addresses some of today's most pressing topics-cyberbullying, trolling, body-shaming-and provides proven prevention and coping strategies for teens. It also highlights the contribution parents, educators, and therapists must make for the maintenance of a safe digital world, along with chapters on self-care methods such as journaling and mindfulness. Navigating the Digital Maze gives readers the knowledge needed to navigate their online presence and form helpful online communities to lead a more healthy, balanced digital life.
Learning Kubernetes Security - Second Edition
Get practical, hands-on experience in Kubernetes security-from mastering the fundamentals to implementing advanced techniques to safeguard your Kubernetes deployments against malicious threatsKey Features: - Understand Kubernetes security fundamentals through real-world examples of threat actor tactics- Navigate the complexities of securing container orchestration with practical, expert insights- Deploy multiple Kubernetes components, plugins, and third-party tools to proactively defend against cyberattacks- Purchase of the print or Kindle book includes a free PDF eBookBook Description: With readily available services, support, and tools, Kubernetes has become a foundation for digital transformation and cloud-native development, but it brings significant security challenges such as breaches and supply chain attacks.This updated edition equips you with defense strategies to protect your applications and infrastructure while understanding the attacker mindset, including tactics like container escapes and exploiting vulnerabilities to compromise clusters. The author distills his 25+ years of experience to guide you through Kubernetes components, architecture, and networking, addressing authentication, authorization, image scanning, resource monitoring, and traffic sniffing. You'll implement security controls using third-party plugins (krew) and tools like Falco, Tetragon, and Cilium. You'll also secure core components, such as the kube-apiserver, CoreDNS, and kubelet, while hardening images, managing security contexts, and applying PodSecurityPolicy. Through practical examples, the book teaches advanced techniques like redirecting traffic from misconfigured clusters to rogue pods and enhances your support incident response with effective cluster monitoring and log analysis.By the end of the book, you'll have a solid grasp of container security as well as the skills to defend your clusters against evolving threats.What You Will Learn: - Implement Kubernetes security best practices, from threat detection to network protection- Build strong security layers and controls using core Kubernetes components- Apply theory through hands-on labs to secure Kubernetes systems step by step- Use security plugins and open-source tools to help mitigate container-based threats- Set up monitoring and logging to quickly detect and respond to cybersecurity threats- Analyze attacker tactics to build stronger cluster defense strategiesWho this book is for: This book is for DevOps and Platform teams managing Kubernetes environments. As security is a shared responsibility, it also addresses on-premises and cloud security professionals, as well as beginner and advanced incident responders. No expert knowledge is required; a basic tech background is all you need as this book covers Kubernetes fundamentals and security principles, delivering practical insights for anyone looking to stay current with modern tech and strengthen their security skills.Table of Contents- Kubernetes Architecture- Kubernetes Networking- Threat Modeling- Applying the Principle of Least Privilege in Kubernetes- Configuring Kubernetes Security Boundaries- Securing Cluster Components- Authentication, Authorization, and Admission Control- Securing Pods- Shift Left (Scanning, SBOM, and CI/CD)- Real-Time Monitoring and Observability- Security Monitoring and Log Analysis- Defense in Depth- Kubernetes Vulnerabilities and Container Escapes- Third-Party Plugins for Securing Kubernetes
Computational Science and Its Applications - Iccsa 2025
The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th International Conference on Computational Science and Its Applications - ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 71 full papers, 6 short papers, and 1 PHD showcase paper were carefully reviewed and selected from 269 submissions. The papers have been organized in topical sections as follows: Part I: Computational Methods, Algorithms and Scientific Applications; High Performance Computing and Networks; Geometric Modeling, Graphics and Visualization; Advanced and Emerging Applications; Information Systems and Technologies; Urban and Regional Planning. Part II: Information Systems and Technologies; Part III: Information Systems and Technologies; Urban and Regional Planning; PHD Showcase Paper; Short papers.
Computational Science and Its Applications - Iccsa 2025
The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th International Conference on Computational Science and Its Applications - ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 71 full papers, 6 short papers, and 1 PHD showcase paper were carefully reviewed and selected from 269 submissions. The papers have been organized in topical sections as follows: Part I: Computational Methods, Algorithms and Scientific Applications; High Performance Computing and Networks; Geometric Modeling, Graphics and Visualization; Advanced and Emerging Applications; Information Systems and Technologies; Urban and Regional Planning. Part II: Information Systems and Technologies; Part III: Information Systems and Technologies; Urban and Regional Planning; PHD Showcase Paper; Short papers.
Computers and Their Applications
This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications, CATA 2025, which took place in San Francisco, CA, USA, during March 17-18, 2025. The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;M machine learning and data mining; and security and networking.
Social First Brands
How can you build a social media strategy that outlasts trends and delivers real impact? Social First Brands is a practical guide for mid-career marketing professionals who want to develop strategies that create authentic connections, strengthen brand credibility and drive measurable results. Written by social media expert Tom Miner, it shares proven frameworks, examples and actionable tools from brands like Crocs, Stanley, Funko, and Ryanair. By showing how leading companies put social media at the heart of their marketing, this book equips you to move beyond quick wins and hacks to build strategies grounded in human behavior and long-term value. You will learn how to: - Develop a bespoke social media strategy aligned with brand principles- Build communities that foster loyalty and advocacy- Define and apply a distinctive, consistent brand personality online- Optimize content to resonate across audiences and platforms With detailed chapters, real-world examples and clear implementation steps, Social First Brands helps you apply proven principles to elevate your brand presence, strengthen customer relationships and advance your career impact. Themes include: strategy, principles, social media optimization, brand personality, audience engagement, community building
Prompting Made Simple
UNLOCK THE POWER OF WORDS IN THE AGE OF AIYou don't need to code, you just need to know how to ask the right questions.Prompting Made Simple is your essential guide to mastering the most valuable new skill of the 21st century: communicating with AI.Whether you're a CEO, entrepreneur, teacher, or just curious about AI, this book gives you the keys to unlock superhuman productivity, creativity, and decision-making, using the right words at the right time.Inside, you'll discover: Proven prompt frameworks to get exactly what you want from ChatGPT and other AIsReal-world examples for business, education, writing, coding, and moreTime-saving shortcuts and expert techniques for beginners and pros alikePitfalls to avoid, and how to future-proof your skills in the AI eraThink of ChatGPT like a genie. Your wish is its command, if you know how to ask.Written by bestselling author of AI Made Simple, and AI advisor Rajeev Kapur, Prompting Made Simple doesn't just teach you how to talk to AI, it teaches you how to think in the age of AI.Prompting Made Simple makes AI easy, useful, and fun. You'll learn how to: Write better emails, plan smarter vacations, and organize your lifeGet AI to brainstorm, tutor, troubleshoot, and write with youUse real-world prompts that work right out of the boxIt's like having a tech-savvy best friend on call 24/7 that is fast, practical, and sometimes laugh-out-loud surprising.If AI Made Simple opened the door, Prompting Made Simple hands you the keys.
Social First Brands
How can you build a social media strategy that outlasts trends and delivers real impact? Social First Brands is a practical guide for mid-career marketing professionals who want to develop strategies that create authentic connections, strengthen brand credibility and drive measurable results. Written by social media expert Tom Miner, it shares proven frameworks, examples and actionable tools from brands like Crocs, Stanley, Funko, and Ryanair. By showing how leading companies put social media at the heart of their marketing, this book equips you to move beyond quick wins and hacks to build strategies grounded in human behavior and long-term value. You will learn how to: - Develop a bespoke social media strategy aligned with brand principles- Build communities that foster loyalty and advocacy- Define and apply a distinctive, consistent brand personality online- Optimize content to resonate across audiences and platforms With detailed chapters, real-world examples and clear implementation steps, Social First Brands helps you apply proven principles to elevate your brand presence, strengthen customer relationships and advance your career impact. Themes include: strategy, principles, social media optimization, brand personality, audience engagement, community building
Introduction to Modern Cryptography
Introduction to Modern Cryptography, the most relied-upon textbook in the field, provides a mathematically rigorous yet accessible treatment of this fascinating subject. The authors have kept the book up-to-date while incorporating feedback from instructors and students alike; the presentation is refined, current, and accurate.The book's focus is on modern cryptography, which is distinguished from classical cryptography by its emphasis on definitions, precise assumptions, and rigorous proofs of security. A unique feature of the text is that it presents theoretical foundations with an eye toward understanding cryptography as used in the real world. This revised edition fixed typos and includes all the updates made to the third edition, including: Enhanced treatment of several modern aspects of private-key cryptography, including authenticated encryption and nonce-based encryption. Coverage of widely used standards such as GMAC, Poly1305, GCM, CCM, and ChaCha20-Poly1305. New sections on the ChaCha20 stream cipher, sponge-based hash functions, and SHA-3. Increased coverage of elliptic-curve cryptography, including a discussion of various curves used in practice. A new chapter describing the impact of quantum computers on cryptography and providing examples of quantum-secure encryption and signature schemes. Containing worked examples and updated exercises, Introduction to Modern Cryptography, Revised Third Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a reference for graduate students, researchers, and practitioners, or a general introduction suitable for self-study.
6gn for Future Wireless Networks
This volume set constitutes the proceedings of the 7th EAI International Conference on 6GN for Future Wireless Networks, 6GN 2024, held in Chongqing, China, in October 19-20, 2024. The 18 papers included in these proceedings were carefully reviewed and selected from50 submissions.They focus on the following topical sections such as Wireless Control and Network Optimization; Edge Computing and Resource Allocation; Intelligent Systems and Simulation; Artificial Intelligence and Digital Economy.
High-Speed Large Capacity Optical Fiber Communications
This book systematically explores the synergistic integration of multidimensional modulation and coding technology, extend wavelength division multiplexing, space division multiplexing (SDM) and signal processing techniques to unlock unprecedented transmission capacities. From foundational principles to experimental validations, this book bridges theoretical concepts with practical implementations, offering a holistic view of scalable solutions for next-generation optical networks. Delving into both established and emerging paradigms, this book develops the key technology of improving the capacity of the transmission. It covers hybrid concatenated coding schemes, multi-carrier generation or multi-band transmission in achieving terabit-scale throughputs. This book also examines the role of self-homodyne coherent systems, SDM transmission system and the channel damage compensation algorithms, illustrates the real-world applicability of these technologies. The concluding chapter synthesizes key advancements and anticipates future challenges, positioning this book as an indispensable resource for researchers, engineers and graduate students seeking to advance the frontiers of high-speed, high-capacity optical communications.
The CISO 3.0
The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, CISOs can no longer rely solely on technical expertise.
Data and Applications Security and Privacy XXXIX
This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy XXXIX, DBSec 2025, held in Gj繪vik, Norway, during June 23-24, 2025. The 19 full papers and 5 short papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: AI applications in security and privacy; User and data privacy; Database and storage security; Differential privacy; Attackers and attack detection; Access control & Internal Controls and Audit process; and Cryptography for security and privacy.
The Ciso 3.0
The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, CISOs can no longer rely solely on technical expertise.
Securing the Digital Frontier
Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected together, vulnerability and compromise are inevitable. The complexity continues to grow, and with it comes the emergent insecurity brought by an ever-developing frontier where digital devices and connected people meet. Security challenges present themselves increasingly often and with ever-greater impacts. This is not going to change anytime soon. Although the internet has transformed communication, business, and social life for the better, the construct of 'cyber space' is incredibly fragile and presents endless risk. Connecting every corner of our lives to those of billions across the world, the frontier is slender between the good and the bad, benefit and catastrophe, real and fake, security and insecurity. Cyber security advice can be confusing, contradictory, and sometimes utterly detached from reality. Too easily, people feel guilty for not knowing what to do, or failing to live up to expectations. People, particularly business leaders and policy makers, must daily make security-sensitive decisions, sometimes unknowingly, without being security experts. Securing the Digital Frontier doesn't offer easy answers, but instead explains sixteen dimensions of this dynamic problem and its current partial solutions. The strong technology of encryption has become commonplace, and is a huge benefit if deployed well: but how can you tell? Programming errors give rise to security problems, but why can we not eliminate them? Privacy is tied up with security, but can the two work against each other? Cyber space is international: how can domestic laws protect us? And what happens when those laws come into conflict with technologies like encryption? Why do you need a punctuation symbol and a capital letter in your password, anyway? Through a grasp of the big picture, through technical and human perspectives, we can begin to explore ways to unwind some of the complexity and find ways to contain the risk.
Applied Cryptography and Network Security
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.
Applied Cryptography and Network Security
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.
Foundations and Practice of Security
This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montr矇al, QC, Canada, during December 09-11, 2024. The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections: Part I: Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and criticalinfrastructure; New trends in advanced cryptographic protocols. Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity.
Applied Cryptography and Network Security
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.
Cyber Secrets
The Brain Rot! Education Guide is a flexible resource for teaching AI literacy, persuasive technology, and digital wellbeingDesigned to accompany the Brain Rot! novel, this education guide equips educators, librarians, and caregivers with everything they need to lead timely, tech-aware learning. Aligned with ISTE Student Standards, it transforms complex issues-like algorithmic bias, emotional manipulation, and digital distraction-into accessible, age-appropriate lessons.The guide includes: Ready-to-use lesson plans tied to each chapter of the novelDiscussion prompts for classroom, book club, or home learning settingsTech-free and tech-supported activities to accommodate any learning environmentPrintable rubrics, worksheets, and visual resources for direct use with studentsCreative extensions including journaling, app audits, ethical design challenges, and roleplay scenariosWhether you're running a digital literacy unit in class, leading a library book group, or guiding your homeschoolers through digital dilemmas, the Brain Rot! Education Guide makes it easy to spark critical thinking, ethical reflection, and meaningful conversations about technology and AI.Let your learners cut through the noise-this guide helps them find the signal.
Learning Web Design
Do you want to build web pages but have no prior experience? This friendly guide is the perfect place to start. You'll begin at square one, learning how the web and web pages work, and then steadily build from there. By the end of the book, you'll have the skills to create a simple site with multicolumn pages that adapt for mobile devices. Each chapter provides exercises to help you learn various techniques and short quizzes to make sure you understand key concepts. This thoroughly revised sixth edition is ideal for students and professionals of all backgrounds and skill levels. It's simple and clear enough for beginners yet thorough enough to be a useful reference for experienced developers keeping their skills up-to-date. Build HTML pages with text, links, images, tables, and forms Use style sheets (CSS) for formatting text, colors, backgrounds, page layout, and simple animation effects Use CSS Flexbox and Grid Layout for sophisticated and flexible page designs Learn the ins and outs of responsive web design to make web pages look great on all devices Get an introductory lesson in JavaScript programming, and use it to add functionality to web pages Understand the ways in which JavaScript has become central to the web development workflow Create and optimize web images so they'll download as quickly as possible Get to know the superpowers of the SVG format The sixth edition features a completely rewritten and expanded JavaScript section written by Aaron Gustafson that provides more opportunities to practice writing code.
HCI and Older Adults
Human-Computer Interaction (HCI) has long studied the design of technology for older adults. The community of HCI researchers working with older adults was no exception to facing a convergence of critique. While there had been critiques made prior, a number of arguments emerged around the same time arguing the broad ways in which existing research had problematic foundations. This included writing and talking about older adults as if they were a homogenous group, a strong emphasis on deficit and decline, and stereotyping views when it came to technology use. The critical turn problematizing how older adults were being framed gained momentum in the 2010s. The literature comprising this critical turn offered insights for what researchers should avoid in their work, as well as high level future directions. Past work was critiqued for positioning older adults as incapable technology users, the same as one another, and chronically ill and in need of care. This monograph summarizes the research that followed and responded to the critiques that began this critical turn.This monograph is focused on three spaces: technology use, intersectionality, and care. The work describes how researchers have fruitfully drawn upon other disciplines including feminist and critical studies, gerontology, social computing, and disability studies to further break down myths, generate knowledge, and open new research spaces. Also included is a view of the gaps that remain and what should come next.
Deepfake Defense for Families
Arm your household against the most convincing lies the internet can conjure. Deepfake Defense for Families is the ultimate, jargon-busting survival guide for parents, teens, and anyone with a phone in their pocket. Cyber-security educator Jenna McAllister tears the mask off AI-generated fake videos, cloned voices, and doctored images-then walks you step-by-step through spotting, verifying, and neutralizing every last one.Inside you'll master: Visual & audio tell-tales-blink rates, pixel glitches, warped lighting, synthetic speech.Cutting-edge detection tools-from free browser plug-ins to pro-grade AI scanners.Source-checking hacks that slice through misinformation in seconds.Family-first cyber-safety plans: password fortresses, 2FA drills, social-media lockdowns.Incident response blueprints to keep calm, collect evidence, and bounce back fast.Real-world case studies-hoaxes debunked, kids protected, reputations saved.Whether you're coaching a classroom, guiding a curious tween, or just sick of bogus clips polluting your feed, this guide delivers battle-tested strategies to protect your children, your privacy, and your peace of mind in an age of reality-bending AI.
Introduction to Cryptographic Definitions
Cryptographic definitions are often abstract and complex, making them challenging for beginners to understand and apply. This concise textbook/resource provides a structured introduction to cryptographic definitions, explaining the syntax definitions and security definitions of cryptographic primitives. It builds foundational knowledge by covering essential mathematical concepts and formal definitions in cryptology. Through a carefully designed learning curve, readers will grasp key elements, why they are defined this way, and how new definitions are developed. The book's presentation enables readers to validate and propose cryptographic definitions, offering a step-by-step guide to understanding them. Topics and features: - Covers all essential components of cryptographic definitions from sets and functions, making the subject accessible to beginners - Introduces intermediate concepts to smooth the transition from basic principles to formal definitions - Equips readers with the skills to validate and propose cryptographic definitions, linking theory with research - Minimizes unnecessary complexity while retaining depth, thereby ensuring a smooth learning experience Advanced undergraduate students, security engineers, and professionals interested in the formal foundations of cryptographic definitions will find the work an invaluable guide. The text is also an ideal reference for graduate students and early-stage researchers in cryptology and computer security.
Podcast Studies
Podcast Studies: Practice into Theory critically examines the emergent field of podcasting in academia, revealing its significant impact on scholarly communication and approaches to research and knowledge creation. This collection presents in-depth analyses from scholars who have integrated podcasting into their academic pursuits. The book systematically explores the medium's implications for teaching, its effectiveness in reaching broader audiences, and its role in reshaping the dissemination of academic work. Covering a spectrum of disciplines, the contributors detail their engagement with podcasting, providing insight into its use as both a research tool and an object of analysis, thereby illuminating the multifaceted ways in which podcasting intersects with and influences academic life. The volume provides substantive evidence of podcasting's transformative effect on academia, offering reflections on its potential to facilitate a more accessible and engaging form of scholarly output. By presenting case studies and empirical research, Podcast Studies: Practice into Theory underscores the originality of podcasting as an academic endeavor and its utility in expanding the reach and impact of scholarly work. It serves as a key resource for academics, researchers, and practitioners interested in the application and study of podcasting as a novel vector for knowledge creation and distribution.
Advanced Content SEO
Unmask the chaos of search engines with Advanced Content SEO: Getting to the Top, No Bullshit.This no-nonsense guide dives into the mechanics of SEO with wit and unapologetic clarity.From dissecting SEO myths and SEM confusion to exploring keyword treasures and technical optimization, you'll find practical strategies for online visibility.Master on-page tweaks, backlink tactics, voice search, and AI advancements, while ensuring ethical practices.Tackle analytics and troubleshooting like a pro and embrace the future of SEO to stay competitive.Ideal for marketers and business owners, this guide arms you with tools to dominate your digital landscape.
SEO That Gets You Seen
SEO That Gets You Seen is a field guide for business owners who are tired of being invisible online. Whether you run a local service, an eCommerce shop, or a consulting business, this step-by-step book will help you understand what matters, take action, and finally show up on Google-without wasting time or money.In this practical guide, you'll learn how to: Understand how Google really works-no tech degree requiredFind keywords your customers are actually searching forOptimize your website structure and pages for rankings and conversionsWrite content that brings in leads (not just traffic)Rank higher in local search and Google MapsBuild backlinks the right way-without spam or shady tricksTrack your progress and avoid common SEO pitfallsYou'll also get access to: Clear explanations in plain EnglishChecklists, examples, and step-by-step instructionsA full glossary of terms to demystify the jargonRecommended tools (both free and paid) for every stage of the processWhether you're doing it yourself or managing someone else who is, this book is built for non-technical business owners who need their websites to perform. It cuts through the confusion and gives you a simple system you can apply at your own pace-even if you're short on time.You don't need to become an SEO expert. You just need to understand enough to make it work-and that's exactly what this book will teach you. If you're ready to stop guessing and start getting results, SEO That Gets You Seen is the guide you've been looking for.
Healing with Artificial Intelligence
This book explores AI transformative role in healthcare, discussing the practical applications of foundational concepts like Machine Learning and Deep Learning in personalized treatments and virtual care platforms, while highlighting AI potential to revolutionize diagnosis, treatment, and prevention.
Principle of Architecture, Protocol, and Algorithms for Cog-Min
The Internet is the most important global infrastructure in the digital economy era. Its role has shifted from simple information exchange to support all kinds of novel scenarios and applications. Considering the diverse communication requirements, the development trend of the future network should support various addressing methods, such as IP address, identity, service, content, geographical location, and other potential communication modes. Therefore, a co-governed, secure, and evolvable novel network architecture is indispensable. This Open Access book focuses on Co-Governed Multi-Identifier Network (CoG-MIN), a promising future network architecture that provides an ecological solution for the sustainable evolution of packet networks. The design of CoG-MIN follows three main principles: blockchain-based global co-governed among top-level domains, endogenous network security, and sustainable evolution. CoG-MIN aims to promote peaceful, orderly, secure, and sustainable development for the global computer network. It will end the gridlock in which network systems need to be continuously upgraded due to the exponential scale expansion of addressing and routing on the current network layer. In other words, CoG-MIN enables a variety of networks to coexist and transition naturally. This will save countless establishment costs and take advantage of existing network equipment and devices. This book provides important reference materials about the mentioned topic for the research of computer network, network security, network communication, and other disciplines.
Healing with Artificial Intelligence
This book explores AI transformative role in healthcare, discussing the practical applications of foundational concepts like Machine Learning and Deep Learning in personalized treatments and virtual care platforms, while highlighting AI potential to revolutionize diagnosis, treatment, and prevention.
Advanced Networking Technologies
Advanced networking methods and technologies are emerging as critical components in enabling novel applications. They are supported by recent technological advances in wireless communications along with the integration of various functionalities such as sensing, communication and artificial intelligence. The main goal of advanced networking is to achieve more efficient, stable and secure networks in internet and mobile communication systems. To fulfil the increasing network demand from applications, advanced networking technologies such as load balancing, fault tolerance technology, encryption technology, virtualization technology and cloud computing are used to improve network speed, optimize network performance, enhance network security, and provide a better user experience. This book covers innovative advances in networking technologies. The book is written in a tutorial style to benefit a broad advanced research audience in networking, communication, computer science, and security. The authors put a particular focus on cyber security for all advanced network concepts and technologies and have included useful case studies.
Online Hate Speech
This book informs readers on how to understand, detect, and mitigate hate speech in online social media. The authors first cover the definition of hate speech and how its prevalence can be measured on online social media platforms using text and graph-based methods. The book then describes the process of detecting hate speech and presents a comprehensive account of the AI models that are currently being used. Further, the authors discuss the associated challenges that must be overcome while using these models. The book concludes with an overview of the mitigation techniques for hate speech, including blocking or suspension of the accounts (hard technique) and counterspeech (soft technique), and a discussion of the effects of these techniques on social media platforms.
Cybersecurity
This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, which took place in Rennes, France, during June 18-19, 2025. The 21 full papers and 2 short papers included in these proveedings were carefully reviewed and selected from 39 submissions. They were organized in topical sections as follows: Artificial intelligence applied to cybersecurity; cybercrime and cyberthreats; cybersecurity; software development security; advances in interdisciplinary cybersecurity: insights from funded reserach projects - CyFRP 2025 special session; complex network analysis for cybersecurity - CNACYS 2025 special session; medical device security and privacy - MeDSec 2025 special session; MDCG guidance; threshold multiparty private set intersection.
ISO/IEC 27001 meets the NIS2 EU Directive - A Practical Guide to Achieving Conformity
A structured, erudite, and practical guide for aligning ISO/IEC 27001:2022 with the legal obligations of the NIS2 Directive. Written for CISOs, compliance managers, IT architects, and auditors, this book translates regulatory expectations into actionable frameworks. It offers clear mappings, practical guidance, and strategic insight-supporting both conformity and maturity. Ideal for public institutions and private enterprises navigating Europe's evolving cybersecurity landscape.